Privacy Policy

Shin Cheng Digital Co., Ltd. Privacy Policy

Shin Cheng Digital Co., Ltd. (hereinafter referred to as “the Company”) attaches great importance to the privacy of its members and follows the provisions of the “Personal Data Protection Act”. Therefore, the Company has formulated a privacy protection policy, and you may refer to the contents of the following privacy protection policy.

Security of Personal Data

Protecting the personal privacy of members is an important business philosophy of the Company. Without the consent of the member, we will never provide the member’s personal data to any third party unrelated to the services of this shopping website. Members should keep their network passwords and personal data confidential, and not provide any personal data, especially network passwords, to anyone. After using the various service functions provided by the Company’s website, please remember to log out of your account. If you share a computer with others or use a public computer, be sure to close the browser window.

Collection, processing and use of personal information

Personal information obtained from the Company’s website will be used only for the Company’s internal purposes and in accordance with the purposes and scope of use originally stated, and will not be provided to third parties or used for other purposes unless otherwise specified in advance or in accordance with relevant laws and regulations.

  • Purpose of Collection.
    The purpose of collection is for marketing, consumer, customer management and service, online shopping and other e-commerce services and surveys, statistics and research analysis (legal specific purpose items numbered O40O, O90, 148, 157). The Company will collect personal information through the process of membership or transaction.
  • Types of personal information collected.
    The personal information collected by the Company on the Website includes
    (1) C001 Personally Identifiable Information: such as member’s name, address, telephone number, email address and other information.
    (2) C002 Financial identifiers: such as credit card or financial institution account information.
    (3) C011 Personal description: e.g., gender, date of birth, etc.
  • Period, region, target and method of use.
    (1) Period: Until the date the member’s client requests to stop using or the Company stops providing the service.
    (2) Region: The personal information of the member will be used in Taiwan.
    (3) Target and method of use: The personal information of members will be collected not only for the functions of membership management and customer management, but also for identification, financial flow service, logistics service, and marketing and promotion. Examples are as follows.
    a. When using the services provided by the Company as a member, the member information will be automatically displayed on the page.
    b. For the purpose of conducting transactions: When members reserve, place bids, purchase, participate in prizes, etc., or engage in other transactions for goods or services, they are required to deliver goods, provide services, pay prices, respond to customer inquiries, respond to the Company’s inquiries to members, provide related after-sales services, and conduct other operations necessary for conducting transactions.
    c. Advertising or marketing: Provide members with information on various electronic magazines, information related to services through e-mail, mail, telephone, etc. The contents or advertisements viewed by members will be personalized, analyzed, and new services developed or existing services improved according to the customer’s personal attributes or purchase history and the browsing history of the Company’s website. To contact members regarding opinion polls, events, message boards, etc., or other service related matters.
    d. Responding to customer inquiries: Responding to inquiries made by members through email, mail, fax, telephone or any other direct indirect contact with the Company.
    e. Other matters incidental to the business: the use necessary to provide services to the Company for the purposes of a. to d. above.
    f. Provision of information to each service provider: When a member makes a reservation, places a bid, purchases, participates in a prize giving event or applies for other transactions for goods or services of the service provider, the Company may provide the member’s personal information file to the service provider to the extent necessary for the transaction, and the service provider shall be responsible for managing the personal information file. The Company will obligate the service provider to handle the personal information in accordance with the principle of protecting the privacy of members by means of a contract, but cannot guarantee that the service provider will comply with it. For details, please contact the respective service providers.
    g. Other: When providing individual services, personal information may be used for purposes other than those specified above. In such cases, the purpose of such use will be stated on the website of the individual service.
  • Member’s rights regarding personal information.
    The person whose personal information is collected by the Company may, in accordance with the Personal Information Protection Law, exercise the following rights with respect to the Company.
    (1) To make inquiries or requests for access.
    (2) To request a copy.
    (3) To request a supplement or correction.
    (4) Request to stop collecting, processing or using.
    (5) Request for deletion.
    If you wish to exercise the above rights, please contact our customer service for application.
  • Please note! If you refuse to provide the necessary information for membership, you may not be able to enjoy the full service or may not be able to use the service at all.

Data Security

In order to protect the privacy and security of our members, our members’ account information will be protected by password. The Company also endeavors to use reasonable technology and procedures to protect the security of all personal information.

How to check or correct personal information

Members can contact our customer service center to inquire about their personal information, make copies, add or correct, stop computer processing and use, or delete, etc. The Company will promptly handle the request.

Cookie

In order to facilitate members’ use, the Company’s website uses cookie technology in order to provide members with the services they need; a cookie is a technology used by the website server to communicate with members’ browsers, which may store random strings on members’ computers to identify users. If you turn off cookies, you may not be able to log in to the site or use the shopping cart.

Revision of Privacy Protection Policy

The Company will revise its website policy from time to time as market conditions change. Members who have any questions about the Company’s website privacy statement or related matters concerning personal information may contact the Company’s customer service center by e-mail.

Shin Cheng Digital Co., Ltd. Computer Processing of Personal Data File Security Maintenance Plan.

In order to ensure the security of personal data files in this industry, the Company shall designate a person to handle the maintenance of personal data files in accordance with the following security maintenance plan.

Security maintenance plan for personal data files.

I. Data security

(1) When personal data files are built on the database, the scope of use and access rights of “user code” and “identification password” shall be determined, and the identification password shall be kept confidential and shall not be shared with others.

(2) If personal data files are stored on a hard disk drive of a personal computer, the data retention unit shall set up a boot password, a password for the screen protection program and related security measures on the personal computer.

(3) Personal data files shall not be used without permission.

(4) Personal data files shall be exited immediately after use and shall not be left on the computer display screen.

(5) The identification password used by the individual shall be kept confidential and shall be changed after a fixed period of time to prevent others from stealing it and using it for a long period of time.

(6) If a customer inquires about his or her personal information by telephone, he or she must be authenticated before replying to the relevant information in order to protect the rights of the customer.

(7) When collecting, processing, internationally transmitting and using personal information over the Internet, we shall take necessary precautionary and protective measures to detect and prevent computer viruses and other malicious software to ensure the normal operation of the system.

(8) When conducting transactions over the Internet, the Company shall assess the possible security risks and develop appropriate security control measures.

II. Data auditing

(1) When processing personal information by computer, we shall verify whether the input, output, editing or correction of personal information is consistent with the original file.

(2) When personal information is provided for use, it shall be verified whether it is consistent with the file information, and if there is any doubt, the original file shall be checked.

(3) A regular audit system shall be established and audit data shall be kept.

III. Equipment Management

(1) The computer equipment used to build personal information shall be regularly maintained by the data retention unit.

(2) Computer equipment shall not be moved arbitrarily unless necessary.

(3) The personal computer used to build personal information shall not be used directly as a tool for public inquiry.

(4) To establish an off-site backup system.

(5) The personal information stored in the abandoned or resold computer hardware shall be deleted.

Other security maintenance matters

(1) When the duties of the personnel who handle personal information files by computer are changed, the stored media and the related data register should be handed over and the receiving personnel should set a separate password for management purposes.

(2) After an employee leaves the company, all passwords that the employee had access to should be cancelled and adjusted appropriately.

(3) Comply with the general computer security maintenance regulations.

最 新 消 息

No Content Available